From the course: Understanding and Prioritizing Data Privacy

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Data in the wrong hands

Data in the wrong hands

From the course: Understanding and Prioritizing Data Privacy

Start my 1-month free trial

Data in the wrong hands

- Data breaches, data losses, data vulnerabilities, data mishaps, we hear the headlines every single day in the news. What happens when there is an attack, when there is a breach, when there's a loss? Can be a number of different things. So data that is not well governed and curated, and by curated, I mean, put into a place of pride, such as when you walk into a museum and you see pictures in a certain order, and lighting in a certain way, and the flow in a certain way. Data that's curated in a certain way, when it's attacked can be it's own vulnerability. Because you put too much data out on show, and someone has reached in and grabbed it and run away with it. Or you can have a back end system or someone is actively hacking in. So what are these losses and who are these attackers? All sorts of different types of people but I'll boil it down particularly the knowing, willful, and criminal types of activities that really…

Contents